Tools

"... The aim of this poster presentation is to give an overview of research into smartcards for e-identity at the Radboud University. It could be accompanied by demonstrations of the e-passport and our own smartcard solutions. Different kinds of smartcards have “sneaked ” into our everyday life over the ..."

The aim of this poster presentation is to give an overview of research into smartcards for e-identity at the Radboud University. It could be accompanied by demonstrations of the e-passport and our own smartcard solutions. Different kinds of smartcards have “sneaked ” into our everyday life over the last decade. Most countries, including all EU countries, now introduced biometric passports (or e-passports) – passports with an embedded contactless smartcard that store biometric data. In many countries contactless smartchips or RFID tags are used in public transport, e.g. the OV-chip card in the Netherlands or the Oyster card in London. Many countries also started issuing electronic ID cards that let citizens digitally sign data (e.g. documents or e-mails) or securely prove their identity over the Internet. Such technologies and applications naturally raise concerns about security and privacy. The Digital Security group at Radboud University has been conducting research into existing smartcard-based solutions for e-identity and exploring possibilities for new, more privacy-friendly alternatives. A central case study in research on existing solutions has been the e-passport, where both the protocols as laid down in international standards [3] and security aspects of actual implementations were investigated. This for instance resulted in advanced techniques for the automated and rigorous testing of e-passports, using model-based testing [4]. Also, a substantial amount of open source software was developed, for reading out and for producing e-passports, which provided the basis for a first pilot implementation of a new electronic driving license for the Ministry of Transport. Work on exploring more privacy-friendly alternatives was started in the OVchip 2.0 project, funded by Stichting NLNet. Here the aim is to push the boundaries of what modern smartcards are capable of, and implement truly privacyfriendly smartcard protocols for public transport or other e-identity applications

"... Abstract. Attribute-based Credentials (ABCs) allow citizens to prove certain properties about themselves without necessarily revealing their full identity. Smart cards are an at-tractive container for such credentials, for security and privacy reasons. But their limited processing power and random a ..."

Abstract. Attribute-based Credentials (ABCs) allow citizens to prove certain properties about themselves without necessarily revealing their full identity. Smart cards are an at-tractive container for such credentials, for security and privacy reasons. But their limited processing power and random access storage capacity pose a severe challenge. Recently, we, the IRMA team, managed to fully implement a limited subset of the Idemix ABC system on a smart card, with acceptable running times. In this paper we extend this functionality by overcoming the main hurdle: limited RAM. We implement an efficient extended Pseudo-Random Number Generator (PRNG) for recomputing pseudorandom-ness and reconstructing variables. Using this we implement Idemix standard and domain pseudonyms, AND proofs based on prime-encoded attributes, and equality proofs of rep-resentation modulo a composite, together with terminal verification and secure messaging. In contrast to prior work that only addressed the verification of one credential with only one attribute (particularly, the master secret), we can now perform multi-credential proofs on credentials of 5 attributes and complex proofs in reasonable time. We provide a detailed performance analysis and compare our results to other approaches.

"... Abstract In this paper we discuss an efficient implementation for selective disclosure of attribute-based credentials on smart cards. In this context we concentrate on the implementation of this core feature of IBM’s Identity Mixer (Idemix) technology. Using the MULTOS platform we are the first to p ..."

Abstract In this paper we discuss an efficient implementation for selective disclosure of attribute-based credentials on smart cards. In this context we concentrate on the implementation of this core feature of IBM’s Identity Mixer (Idemix) technology. Using the MULTOS platform we are the first to provide this feature on a smart card. We compare Idemix with Microsoft’s U-Prove technology, as the latter also offers selective disclosure of attributes and has been implemented on a smart card [10].

"... Abstract This short note concentrates on an optimisation of the attribute-proving protocol by Batina et al. [1], and provides the improved performance figures. The protocol relies on elliptic curve cryptography with bilinear pairings. These pairings provide signatures that are stable under multiplic ..."

Abstract This short note concentrates on an optimisation of the attribute-proving protocol by Batina et al. [1], and provides the improved performance figures. The protocol relies on elliptic curve cryptography with bilinear pairings. These pairings provide signatures that are stable under multiplication with a blinding factor. In this way multiple proofs are unlinkable, and thus provides a privacy-friendly solution. The optimisation involves better exploitation of the (limited) elliptic curve primitives that are available on the current generation of Java Card smart cards. It leads to a reduction of the on-card running times (wrt. to [1]) of roughly a factor three. Total running times with this new protocol are below one second. A further reduction with a factor two or three is needed to achieve performance that is acceptable in practice. Key words: anonymous credentials, elliptic curve cryptography, smart

"... Abstract This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are ..."

Abstract This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing. Java Card smart cards offer only very limited access to the cryptographic coprocessor. It thus requires some ingenuity to get the protocol running with reasonable speed. We realise protocol runs with on-card computation times in the order of 1.5 seconds. It should be possible to further reduce this time with extended access to the cryptographic coprocessor. Key words: anonymous credentials, elliptic curve cryptography, smart

"... Summary. In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the req ..."

Summary. In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the requirements of the protocol and the capabilities of the smart card. In this context we concentrate on the implementation of Microsoft’s U-Prove technology on the MULTOS smart card platform. Our implementation aims at making the smart card independent of any other resources, either computational or storage. In contrast, Microsoft suggests an alternative approach based on device-protected tokens which only uses the smart card as a security add-on. Given our very good performance results we argue that our approach should be considered in favour of Microsoft’s one. Furthermore we provide a brief comparison between Java Card and MULTOS which illustrates our choice to implement this technology on the latter more flexible and low-level platform rather than the former. Key words: anonymous credentials, smart cards, U-Prove, MULTOS, Java Card 1

by
Ton Van Deursen, Sjouke Mauw, Pim Vullers
- In Proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, Lecture Notes in Computer Science, 2009

"... Abstract. We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitions are based on an intuitive notion of ownership related to physical ownership. They are aimed at RFID systems ..."

Abstract. We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitions are based on an intuitive notion of ownership related to physical ownership. They are aimed at RFID systems, but should be applicable to any scenario sharing the same intuition of ownership. We discuss the connection between ownership and the notion of desynchronization resistance and give the first formal definition of the latter. We apply our definitions to existing RFID protocols, exhibiting attacks on desynchronization resistance, secure ownership, and secure ownership transfer. Key words: RFID protocols, ownership, desynchronization resistance, ownership transfer, formal verification 1

"... Abstract — Electronic devices admit the composition of applications from distributed services, like shared content, functionality and resources. Without proper management the quality of service (QoS) of this type of application is unacceptable. This paper presents a context-aware resource management ..."

Abstract — Electronic devices admit the composition of applications from distributed services, like shared content, functionality and resources. Without proper management the quality of service (QoS) of this type of application is unacceptable. This paper presents a context-aware resource management middleware for service oriented applications, which aims to handle the inherent dynamics of services and the network. A way to manage the services and resources of a device is presented. Based on measurable and manageable services, this middleware can cope with changes of the environment of an application and optimize its overall performance. User desired application-oriented QoS is specified by an Orchestrator, which orchestrates the collaboration of distributed services to accomplish an application. A resource management service is built to support making dynamic service coordination decisions for the Orchestrator. For this, the resource management service gathers statistics of the required services and their resource utilization over a cross-layer monitoring model. An important aspect for keeping the privacy of the services and controlling the access to resources, all devices and services are organized in virtual communities. Only authenticated users are capable to access services and resources. A free view point 3D video streaming application is chosen to prove the feasibility of the proposed middleware. Keywords- Access control; Resource managemen;, Serviceoriented applicaitons